Risk Assessment for Big Data in Cloud: Security, Privacy and Trust
暂无分享,去创建一个
[1] Ernesto Damiani,et al. Toward Economic-Aware Risk Assessment on the Cloud , 2015, IEEE Security & Privacy.
[2] Ernesto Damiani. Toward big data risk analysis , 2015, 2015 IEEE International Conference on Big Data (Big Data).
[3] Trevor Wood-Harper,et al. A case study analysis of risk, trust and control in cloud computing , 2013, 2013 Science and Information Conference.
[4] Frederik Gailly,et al. An Exploratory Analysis on the Comprehension of 3D and 4D Ontology-Driven Conceptual Models , 2016, ER Workshops.
[5] R. Feldt,et al. Software Product Line Variability: A Systematic Mapping Study , 2008 .
[6] Marisa W. Paryasto,et al. Big-data security management issues , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).
[7] Neeraj Suri,et al. Quantifiably Trusting the Cloud: Putting Metrics to Work , 2016, IEEE Security & Privacy.
[8] Vivek Agrawal,et al. A Framework for the Information Classification in ISO 27005 Standard , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[9] Pearl Brereton,et al. Using Mapping Studies in Software Engineering , 2008, PPIG.
[10] Wang Hai-tao,et al. The application of cloud matter — Element in information security risk assessment , 2017, 2017 3rd International Conference on Information Management (ICIM).
[11] Dong Yue,et al. Security risk assessment of cyber physical power system based on rough set and gene expression programming , 2015, IEEE/CAA Journal of Automatica Sinica.
[12] M. Petticrew,et al. Systematic Reviews in the Social Sciences: A Practical Guide , 2005 .
[13] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[14] Mira Kartiwi,et al. A Systematic Literature Mapping of Risk Analysis of Big Data in Cloud Computing Environment , 2018 .
[15] Leila Regina Techio,et al. EMSCLOUD – an evaluative model of cloud services cloud service management , 2015, Fifth International Conference on the Innovative Computing Technology (INTECH 2015).
[16] Jing Song,et al. The state of the art of risk assessment and management for information systems , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).
[17] Diao Zhe,et al. Study on Data Security Policy Based on Cloud Storage , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).
[18] John Grundy,et al. A systematic mapping study of mobile application testing techniques , 2016, J. Syst. Softw..
[19] Kai Petersen,et al. Systematic Mapping Studies in Software Engineering , 2008, EASE.